Title :
Proxies for anonymous routing
Author :
Reed, Michael G. ; Syverson, Paul F. ; Goldschlag, David M.
Author_Institution :
Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
Abstract :
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This paper describes a flexible communications infrastructure, called onion routing, which is resistant to traffic analysis. Onion routing lies just beneath the application layer, and is designed to interface with a wide variety of unmodified Internet services by means of proxies. Onion routing has been implemented on a Sun Solaris 2.4; in addition, proxies for World Wide Web browsing (HTTP), remote logins (RLOGIN), e-mail (SMTP) and file transfers (FTP) have been implemented. Onion routing provides application-independent, real-time and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis. Applications making use of onion routing´s anonymous connections may (and usually should) identify their users over the anonymous connection. User anonymity may be layered on top of the anonymous connections by removing identifying information from the data stream. Our goal is anonymous connections, not anonymous communication. The use of a packet-switched public network should not automatically reveal who is talking to whom; this is the traffic analysis that onion routing complicates
Keywords :
Internet; data privacy; electronic data interchange; electronic mail; packet switching; real-time systems; security of data; telecommunication network routing; telecommunication traffic; FTP; HTTP; SMTP; Sun Solaris 2.4; World Wide Web browsing; anonymous connections; anonymous routing; application-independent real-time bi-directional anonymous connections; eavesdropping; electronic mail; file transfers; flexible communications infrastructure; identifying information; network traffic analysis-resistant method; onion routing; packet-switched public network; proxies; public network; remote logins; unmodified Internet services; user anonymity; Communication switching; Electronic mail; IP networks; Packet switching; Payloads; Protection; Routing; Sockets; Telecommunication traffic; Web sites;
Conference_Titel :
Computer Security Applications Conference, 1996., 12th Annual
Conference_Location :
San Diego, CA
Print_ISBN :
0-8186-7606-X
DOI :
10.1109/CSAC.1996.569678